Security Breach and Forensics in Intelligent Systems

被引:2
|
作者
Devi, M. S. Girija [1 ]
Nene, Manisha J. [1 ]
机构
[1] Def Inst Adv Technol DIAT Deemed Univ, Dept Comp Sci Engn, Pune 411025, Maharashtra, India
关键词
Intelligent systems; Security breach; Forensic analysis; Network forensic framework;
D O I
10.1007/978-981-13-1747-7_33
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Evolving smart environments making use of IoT wares in conjunction with the evolving security threats in these intelligent systems poses several challenges in forensic investigation of security breaches and cyber crimes involving such devices. This paper explores these challenges and emphasizes on the need for enhancing the capabilities of existing tools for forensic analysis. The contribution of this paper is multifold. First, it enlists the potential threats in the world of intelligent systems, and second, it enumerates the challenges to forensic analysis of crimes involving intelligent devices as subject and/or object. Third, it comments on the capability of existing forensic tools to handle the challenges. Fourth, it proposes the required features for a revamped forensic analysis framework for intelligent systems. The study holds the potential to guide a way towards implementation of technical solutions to handle the challenges envisaged in the ever-evolving smart environment's investigations.
引用
收藏
页码:349 / 360
页数:12
相关论文
共 50 条
  • [31] Cyber Security in Cooperative Intelligent Transportation Systems
    Skorput, Pero
    Vojvodic, Hrvoje
    Mandzuka, Sadko
    PROCEEDINGS OF 2017 INTERNATIONAL SYMPOSIUM ELMAR, 2017, : 35 - 38
  • [32] Intelligent Security and Risk Analysis in Network Systems
    Mohammadian, Masoud
    2017 INTERNATIONAL CONFERENCE ON INFOCOM TECHNOLOGIES AND UNMANNED SYSTEMS (TRENDS AND FUTURE DIRECTIONS) (ICTUS), 2017, : 825 - 830
  • [33] Impact of security/AAA on Intelligent Transport Systems
    Tokuda, K
    WIRELESS PERSONAL COMMUNICATIONS, 2002, 22 (02) : 245 - 251
  • [34] Towards Internet of Things (IoT) Forensics Analysis on Intelligent Robot Vacuum Systems
    Zhou, Honghe
    Deng, Lin
    Xu, Weifeng
    Yu, Wei
    Dehlinger, Josh
    Chakraborty, Suranjan
    2022 IEEE/ACIS 20TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH, MANAGEMENT AND APPLICATIONS (SERA), 2022, : 91 - 98
  • [35] It security forensics: Promises and shortcomings
    Malek, Manu
    ICE-B 2006: Proceedings of the International Conference on e-Business, 2006, : IS17 - IS17
  • [36] IT security forensics: Promises and shortcomings
    Malek, Manu
    WINSYS 2006: Proceedings of the International Conference on Wireless Information Networks and Systems, 2006, : IS17 - IS17
  • [37] Multimedia in Forensics, Security, and Intelligence
    Battiato, Sebastiano
    Emmanuel, Sabu
    Ulges, Adrian
    Worring, Marcel
    IEEE MULTIMEDIA, 2012, 19 (01) : 17 - 19
  • [38] Currency security and forensics: a survey
    Chambers, J.
    Yan, W.
    Garhwal, A.
    Kankanhalli, M.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2015, 74 (11) : 4013 - 4043
  • [39] Security: Expand nuclear forensics
    Klaus Mayer
    Nature, 2013, 503 : 461 - 462
  • [40] It security forensics: Promises and shortcomings
    Malek, Manu
    SIGMAP 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND MULTIMEDIA APPLICATIONS, 2006, : IS17 - IS17